000 | 02916nam a22004455i 4500 | ||
---|---|---|---|
001 | 295127 | ||
003 | MX-SnUAN | ||
005 | 20170705134232.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2005 gw | o |||| 0|eng d | ||
020 |
_a9783540315988 _99783540315988 |
||
024 | 7 |
_a10.1007/11596981 _2doi |
|
035 | _avtls000347813 | ||
039 | 9 |
_a201509030743 _bVLOAD _c201404121112 _dVLOAD _c201404090849 _dVLOAD _y201402070940 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aQ334-342 | |
100 | 1 |
_aHao, Yue. _eeditor. _9329304 |
|
245 | 1 | 0 |
_aComputational Intelligence and Security : _bInternational Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings, Part II / _cedited by Yue Hao, Jiming Liu, Yu-Ping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2005. |
|
300 |
_axLii, 1166 páginas Also available online. _brecurso en línea. |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v3802 |
|
500 | _aSpringer eBooks | ||
520 | _aThe two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications. | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aLiu, Jiming. _eeditor. _9310029 |
|
700 | 1 |
_aWang, Yu-Ping. _eeditor. _9329305 |
|
700 | 1 |
_aCheung, Yiu-ming. _eeditor. _9329306 |
|
700 | 1 |
_aYin, Hujun. _eeditor. _9329307 |
|
700 | 1 |
_aJiao, Licheng. _eeditor. _9329308 |
|
700 | 1 |
_aMa, Jianfeng. _eeditor. _9329309 |
|
700 | 1 |
_aJiao, Yong-Chang. _eeditor. _9329310 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783540308195 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/11596981 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c295127 _d295127 |